Latest Articles

Common LinkedIn scams: Beware of phishing attacks and fake job offers

Common LinkedIn scams: Beware of phishing attacks and fake job offers

Common LinkedIn scams: Beware of phishing attacks and fake job offers

LinkedIn scammers attack when we may be at our most vulnerable – here’s what to look out for and how to avoid falling victim to fraud when using the platform

André Lameiras09 May 2022


Defending against APT attacks – Week in security with Tony Anscombe

Defending against APT attacks – Week in security with Tony Anscombe

Defending against APT attacks – Week in security with Tony Anscombe

The conflict in Ukraine has highlighted the risks of cyberespionage attacks that typically involve Advanced Persistent Threat groups and often target organizations' most valuable data

Editor06 May 2022


There’s no sugarcoating it: That online sugar daddy may be a scammer

There’s no sugarcoating it: That online sugar daddy may be a scammer

There’s no sugarcoating it: That online sugar daddy may be a scammer

The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud

Phil Muncaster05 May 2022


3 most dangerous types of Android malware

3 most dangerous types of Android malware

3 most dangerous types of Android malware

Here's what you should know about some of the nastiest mobile malware around – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely

Lukas Stefanko04 May 2022


What’s behind the record-high number of zero days?

What’s behind the record-high number of zero days?

What’s behind the record-high number of zero days?

Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity

Phil Muncaster03 May 2022


TA410 under the microscope – Week in security with Tony Anscombe

TA410 under the microscope – Week in security with Tony Anscombe

TA410 under the microscope – Week in security with Tony Anscombe

Here's what you should know about FlowingFrog, LookingFrog and JollyFrog, the three teams making up the TA410 espionage umbrella group

Editor29 Apr 2022


A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity

A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity

A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity

ESET researchers reveal a detailed profile of TA410: we believe this cyberespionage umbrella group consists of three different teams using different toolsets, including a new version of the FlowCloud espionage backdoor discovered by ESET.

Alexandre Côté Cyr and Matthieu Faou27 Apr 2022


BEC: What to know about – and how to stop – the costliest internet scam

BEC: What to know about – and how to stop – the costliest internet scam

BEC: What to know about – and how to stop – the costliest internet scam

BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It’s long past time that organizations got a handle on these scams.

Phil Muncaster26 Apr 2022


Webcam hacking: How to know if someone may be spying on you through your webcam

Webcam hacking: How to know if someone may be spying on you through your webcam

Webcam hacking: How to know if someone may be spying on you through your webcam

Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing. Here’s how to keep an eye on your laptop camera.

Phil Muncaster25 Apr 2022


Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

Cybersecurity threats to critical infrastructure – Week in security with Tony Anscombe

As the Five Eyes nations warn of attacks against critical infrastructure, we look at the potentially cascading effects of such attacks and how essential systems and services can ramp up their defense

Editor22 Apr 2022


Critical infrastructure: Under cyberattack for longer than you might think

Critical infrastructure: Under cyberattack for longer than you might think

Critical infrastructure: Under cyberattack for longer than you might think

Lessons from history and recent attacks on critical infrastructure throw into sharp relief the need to better safeguard our essential systems and services

André Lameiras21 Apr 2022


Is your Lenovo laptop vulnerable to cyberattack?

Is your Lenovo laptop vulnerable to cyberattack?

Is your Lenovo laptop vulnerable to cyberattack?

Here’s what to know about vulnerabilities in more than 100 Lenovo consumer laptop models and what you can do right away to stay safe – all in under three minutes

Tony Anscombe20 Apr 2022


Apt Activity Report
MDR Protection